
Security Operations 4

Quiz
•
Professional Development
•
Professional Development
•
Hard

Michael Caponpon
FREE Resource
Student preview

35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Mark wants to have a way to determine if attackers have modified files on a critical web application server. What type of tool should he deploy if he wants to be able to check for changes of this nature?
Drive encryption
File availability monitoring
File encryption
File integrity monitoring
Answer explanation
File integrity monitoring tools use hashes to validate that files match their original content. If the files change, the hashes will not match, allowing the tool to alert administrators that a change has occurred. Drive encryption and file encryption both protect the confidentiality of data but don't indicate changes without a signature. File availability monitoring is not a typical tool, although system or service availability monitoring is.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Katie's organization uses an IoC feed that helps her to identify new threats. A recent feed update includes the following hash for Emotet malware: cecc5bba6193d744837e689e68bc25c43eda7235 Where is Katie most likely going to be able to use this hash to identify potential attacks?
Via her EDR tools
Via her firewall
Via her system logs
All of the above
Answer explanation
Endpoint detection and response (EDR) tools are most likely to use hashing to match known malicious files like this. Firewalls may provide the capability, but system logs do not, ruling out the “all of the above” option.
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following tools is best suited to deploying and maintaining a secure baseline for Windows systems for an entire enterprise?
PowerShell
Group Policy
Manual configuration
Script‐based deployments
Answer explanation
Group Policy is the most common way of deploying baselines throughout Windows organizations. Group Policy Objects (GPOs) are set and managed across the entire Active Directory organization, allowing them to be modified for groups or specific purposes while inheriting most settings from the top of the organizational structure. PowerShell is a scripting tool, and both PowerShell and Group Policy are commonly used for specific purposes, but GPOs are typically preferred at scale. Manual configuration is not recommended for an entire organization.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Perry wants to ensure that an unsecure protocol is secured when in transit through his local network. What solution could he adopt to ensure that this traffic is protected?
Use SD‐WAN.
Wrap the protocol using TLS.
Encrypt all files that are sent using AES.
Encrypt all files that are sent using SHA‐1.
Answer explanation
A common technique to ensure that traffic sent via unsecure protocols remains secure is to wrap it using TLS. SD‐WAN is used to manage external connectivity, and there is no mention of files, only of an unsecure protocol. Even if files were encrypted, the rest of the traffic might leak information. Hashing does not leave data recoverable, making it unusable for this type of use in almost all cases.
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Annie wants to implement a passwordless authentication system. Which of the following would not meet her needs?
Windows Hello
A PIN‐based factor
A cell‐phone authenticator application
A FIDO2 security key
Answer explanation
Passwordless authentication avoids making users provide a password or PIN by using a proof of identity from a device or token. Windows Hello, cell‐based authenticator applications, and FIDO2 security keys all support this, but entering a PIN does not.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Laura wants to harden an ICS and SCADA devices her organization uses to manage critical infrastructure. The devices are old and unsupported, without recent updates. What hardening techniques are most likely to be available to her to help deal with these devices?
Isolation
Segmentation
Adding host‐based firewalls
Configuring host‐based IPS
Answer explanation
Since ICS and SCADA devices need connectivity as part of their design, Laura knows that using segmentation to place the devices in a secure network is likely her best hardening option. Isolating the devices would break the functionality of ICS/SCADA systems. Neither ICS nor SCADA devices typically have support for host‐based firewalls or host‐based IPS.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Bob uses an IoC feed to allow his SIEM to identify and correlate common malicious activity. What phase of the incident response process best describes this?
Preparation
Detection
Containment
Eradication
Answer explanation
The detection and analysis phases of the incident response process both commonly leverage IoCs to detect and then correlate information to identify incidents. Preparation might involve setting up threat feeds and building automations to help notify security administrators of issues. Containment and eradication may leverage threat data to help understand common actions taken by threat actors, but the SIEM detecting and correlating events is not typically part of containment or eradication.
Create a free account and access millions of resources
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
10 questions
Afterschool Activities & Sports

Quiz
•
6th - 8th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
15 questions
Cool Tool:Chromebook

Quiz
•
6th - 8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
20 questions
Bullying

Quiz
•
7th Grade
18 questions
7SS - 30a - Budgeting

Quiz
•
6th - 8th Grade
Discover more resources for Professional Development
11 questions
All about me

Quiz
•
Professional Development
10 questions
How to Email your Teacher

Quiz
•
Professional Development
5 questions
Setting goals for the year

Quiz
•
Professional Development
8 questions
Ötzi the Iceman: A 5,000-Year-Old True Crime Murder Mystery | Full Documentary | NOVA | PBS

Interactive video
•
Professional Development